Vulnerability Details : CVE-2021-33516
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Products affected by CVE-2021-33516
- cpe:2.3:a:gnome:gupnp:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:gupnp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33516
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33516
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
NIST |
References for CVE-2021-33516
-
https://gitlab.gnome.org/GNOME/gupnp/-/issues/24
Security Issue: Server does not check value of Host header (#24) · Issues · GNOME / gupnp · GitLabIssue Tracking;Vendor Advisory
-
https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536
Security-relevant releases for GUPnP issue CVE-2021-33516 - Platform - GNOME DiscoursePatch;Vendor Advisory
Jump to